Data and Applications Security XIX
From MaRDI portal
Publication:5897462
DOI10.1007/11535706zbMath1158.94399OpenAlexW2485395822MaRDI QIDQ5897462
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535706
Related Items (4)
Database Outsourcing with Hierarchical Authenticated Data Structures ⋮ Efficient authenticated data structures for graph connectivity and geometric search problems ⋮ Super-Efficient Verification of Dynamic Outsourced Databases ⋮ Authenticated hash tables based on cryptographic accumulators
This page was built for publication: Data and Applications Security XIX